2018
DOI: 10.1109/tetci.2017.2764109
|View full text |Cite
|
Sign up to set email alerts
|

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
37
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(37 citation statements)
references
References 25 publications
0
37
0
Order By: Relevance
“…Edge computing is a promising paradigm to address these issues due to its unique features. There are some schemes that focus on cloud data storage by applying edge computing to fight against data theft attack [99] and insider attack [100], [101].…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Edge computing is a promising paradigm to address these issues due to its unique features. There are some schemes that focus on cloud data storage by applying edge computing to fight against data theft attack [99] and insider attack [100], [101].…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…To resist inside attack in a cloud server, Wang et al [100] designed a three-layer hierarchical storage scheme in fog computing, which divides user data into three parts of different size with a Hash-Solomon code algorithm and stores them in local device, fog node and cloud server, respectively. Allocating the different ratio of user data stored in different devices makes insider attackers impossible to recover the real user data even if they get all data in a certain device.…”
Section: Secure Data Storage In Edge Computingmentioning
confidence: 99%
“…Lyu et al proposed a privacy-preservation system for fog-based aggregation in Smart Grid with differential privacy so as to enable the intermediate fog nodes to safely collect data from connected smart meters [17]. Wang et al presented a three-layer privacy preserving cloud storage scheme in cloud computing to resist possible attacks from the inside of cloud servers [18]. Xue et al designed verifiable security fine-grained access control in vehicular cloud computing to share latency-sensitive data [19].…”
Section: Researches On Relevant Privacy-protection Schemesmentioning
confidence: 99%
“…The fog computing layer is deployed between cloud and IoT devices. This layer plays an important role in the transmission between the cloud computing layer and the device layer [12]. Fog layer contains network devices such as router, access points, gateways, switches, and video surveillance cameras.…”
Section: Fog Layermentioning
confidence: 99%